Intrusion Techniques

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Fifth International Conference on Information Technology: New Generations

Intrusion Techniques: Comparative Study of Network Intrusion


Detection Systems

Moses Garuba, Chunmei Liu, and Duane Fraites


Department of Systems and Computer Science, Howard University

Abstract
Organizations require security systems that are flexible and systems are impossible because it entails securing a system
adaptable in order to combat increasing threats from for both present and future threats [10]. Pfleeger and
software vulnerabilities, virus attacks and other malicious Pfleeger indicate that a “trusted system” can be developed
code, in addition to internal attacks. Network intrusion through a layered defense and supports the use of IDS as
detection systems, which are part of the layered defense part of this layered defense [10]. Therefore, identifying an
scheme, must be able to meet these organizational adequate NIDS is of paramount importance to the overall
objectives in order to be effective. Although signature security objective of any organization.
based network intrusion detection systems meet several The structure of the paper is organized as follows. The
organizational security objectives, heuristic based network third section introduces intrusion detection systems (IDS),
intrusion detection systems are able to fully meet the in particular the two types of NIDS, which would be the
objectives of the organization. Through a comparative focus of the paper. The fourth section justifies the necessity
theoretical study, this paper analyzes several organizational for NIDS by identifying the various network threats that
security objectives in order to determine the network exist. The fifth section explores topically, the cost benefit
intrusion detection system that effectively meets these analysis of implementing a NIDS. The sixth section
objectives. Through conclusive analysis of the study, develops a comparative study delineating the benefits
heuristic based systems are better served to meet the offered by heuristic and signature based NIDS. The
organizational objectives than signature based systems. following two sections draw conclusions from the preceding
The analysis was based on which system provided definitive sections and introduce future works, respectively.
security objectives and offered the flexibility, adaptability,
and reduced vulnerability that an organization requires. 2. RELATED WORK

1. INTRODUCTION Many works have been conducted in the area of IDSs and
other network devices including defining and comparing the
The movement towards a more secured computing two various types of NIDS. Work also has been done in
system continues to rise as management becomes cognizant defining the cost benefit analysis of IDSs. However, work
of the numerous threats that exist to their organizations. as to my knowledge, has not been done in comparing the
Currently, there are numerous controls; of a technical, security objectives for the purpose of management.
physical and administrative nature that are implemented to
mitigate threats. This paper is focused on technical controls, 3. INTRUSION DETECTION SYSTEMS
primarily on network intrusion detection systems (NIDS)
and the benefits that are drawn from implementing a Intrusion detection systems are classified into two general
heuristic based NIDS in comparison to a signature based types known as signature based and heuristic based.
NIDS. The role of NIDSs as Pfleeger and Pfleeger describe, Pfleeger and Pfleeger describe signature-based systems as
lends to the defense in depth schematic by providing one “pattern-matching” systems that detect threats based on the
layer in the layers of protection required for a network [10]. signature of the attack matching a known pattern. Heuristic
Although, there are skeptics as to the feasibility of detection based systems, which are synonymous with anomaly-based
systems, Chuvakin asserts that “the nature and complexity systems, detect attacks through deviations from a model of
of electronic communication lead one to believe that 100 normal behavior [10]. IDSs that operate on a single
percent effective prevention is unachievable” [1]. workstation are known as host intrusion detection system
Consequently, the importance of detection devices cannot (HIDS), while those that operate as stand-alone devices on a
be understated; rather they should be used in conjunction network are known as NIDS. HIDS monitor traffic on its
with other types of security devices. Furthermore, an host machine by utilizing the resources of its host to detect
organization’s network cannot be secured through one attacks. NIDS operate as a stand-alone device that monitors
security device; neither can it be secured through multiple traffic on the network to detect attacks. NIDS come in two
security devices. Pfleeger and Pfleeger assert that secure general forms; signature based NIDS and heuristic based
NIDS. These two types of NIDS provide a varying degree

978-0-7695-3099-4/08 $25.00 © 2008 IEEE 593


592
DOI 10.1109/ITNG.2008.231
of security based on several objectives that will be analyzed survey on insider attacks and found that over 80 percent of
in forthcoming sections. the attackers held technical positions within the organization
[6]. Although a robust system is needed, a system that has a
4. NETWORK THREATS wide coverage scope is also required that can track the
activities of external traffic in addition to the internal
NIDSs are normally one of the first lines of defense, activities.
along with firewalls, in a typical network security model.
Consequently, NIDS must be able to monitor extensive and 5. COST BENEFIT ANALYSIS OF IDS
differing attacks. The tasks of monitoring the traffic
throughout the network is becoming increasingly difficult as Upon identification of the various threats to an
new threats and vulnerabilities are exposed every year. The organization, management should determine the financial
problem is further compounded by the exorbitantly high savings that are incurred through acquiring a NIDS. The
number of sites that contain malicious code and the ease in return on investment of an IDS and more specifically a
which these codes can be deployed. Lemke indicates NIDS, is beyond the scope of this paper, but its cost of
through a report by Symantec, that there are more than implementation will be discussed. The cost of
38,000 Web sites containing source code for virus and implementing and maintaining a NIDS should be considered
worms [7]. McHugh, Allen and Christie provide further in comparison to the potential risk impacts that can occur
evidence by stating that “anyone can attack Internet sites when not implemented. One consideration that an
using readily available intrusion tools and exploit scripts organization must account for before purchasing such a
that capitalize on widely known vulnerabilities”[8]. The security device is whether their organization is large enough
period where skilled and knowledgeable hackers developed to justify such a purchase. Additionally, the probability of
and deployed attacks are now being replaced by novices threat to various assets and resources must factor into the
with malicious intentions, readily deploying malicious code discussion. NIDS are suitable for medium to large scale
against unsuspecting organizations. The diagram found in organizations due to their volume of data and resources. For
Appendix 1, developed by McHugh, depicts a ten year this reason many smaller companies are hesitant in
period between 1990 and 2000 where the growing trend of deploying IDS as contended by Chuvakin [1]. The benefit
intruder knowledge decreases while the sophistication of of acquiring a NIDS is dependent on the fact that it costs
attacks increases [2]. less to implement and maintain than the loss that can be
The lack of knowledge required to attack an incurred due to vulnerabilities being exposed. As proposed
organization’s network using existing attacks is by Iheagwara, Blyth and Singhal, the cost effectiveness of
compounded further by the development of new software an IDS is determinant on any estimated loss from intrusions
vulnerabilities through which attacks exploit. Messmer, [6]. Several cost factors must be considered for acquiring
who uses the study performed by Internet Security Systems and maintaining a NIDS. Cost factors such as, initial cost,
indicates that software vulnerabilities recorded for the first ongoing maintenance cost, and personnel required for
eight months of 2006 exceeds all vulnerabilities found in monitoring. McHugh provides estimated costs for these
2005 [9]. As a result, security devices such as, NIDS must factors listed: initial cost is listed at $10,000; maintenance
be able to detect and identify the various threats that exist. cost is listed at 15 percent of the initial cost per year; and
These threats require a robust system capable of defending personnel cost is defined by the organization based on the
against existing threats while having the flexibility to adapt level of monitoring they requires, whether continual or
to new threats. periodic monitoring [2]. The implementation and ongoing
Alternatively, much emphasis is placed on external costs should then be compared to the potential risks impact
threats, but NIDS must also be able to defend against that can be incurred by the organization to determine if there
internal threats. There are two types of internal threats: are the cost savings.
intentional attacks and unintentional attacks. Intentional External attacks such as virus attacks and other malicious
attacks are malicious attacks carried out by employees for code can prove to be quite costly for organizations. Jacques
various reasons such as, financial payment from outside identifies a research study indicating that malicious code
sources or disgruntled employees. Unintentional attacks attacks cost businesses between $169bn to $204bn for the
such as, deleting important data files cause unwarranted year of 2004 [12]. Although this amount is a cumulative
performance and financial damage to the organization. total for all businesses, it shows that financial losses are real
Although seemingly unnoticed and inconsequential, internal for businesses affected. Then again, the cost of internal
attacks occur more frequently than outside attacks. Lynch threats can prove even more costly as indicated by
proposes that between 60 to 70 percent of the attacks that CERT/CC (n.d.) where they revealed that insider attacks can
occur within an organization are internal [18]. The threat of cost millions of dollars to any one organization [6]. With
internal attacks are further magnified when the origin of this in mind, it is safe to infer that acquiring a NIDS is
most internal attacks are coming from the technical and justifiable based on the probable loss to the organization and
network security personnel. CERT/CC (n.d.) conducted a the potential savings through implementation. Calculation

593
594
of the cost benefit of a NIDS allows organizations to focus the occurrence of an attack. Subsequently, any deviation
on the basis of this paper, which is to determine the NIDS from normal behavior by a user or program within the
that fulfills the security objectives for an organization. system would be detected and flagged, thereby generating
an alarm. Unfortunately, most alarms are benign and false
6. COMPARATIVE STUDY OF SECURITY positives are derived as a result. For example, a
OBJECTIVES programmer with authorization to all aspects of the system,
but usually works with programs files, may access log files
The comparative study of the security objectives of the and would be flagged as a result, since it deviates from the
two NIDS provides the basis of the paper. The two types of normal behavior of the programmer. High false positives,
NIDS, heuristic and signature based, provide varying as asserted by Pfleeger and Pfleeger can lead to
functions that can be beneficial to any organization. In light administrators becoming disenchanted with heuristic
of these functions identified, the security objectives are systems by investigating less, alarms raised [10]. Although,
analyzed and observations derived as to the more effective the high rate of false positives are solvable. In accordance
NIDS for an organization. with the structure of a heuristic based NIDS, refinement of
its detective analysis is based on continued sampling of
statistical and behavioral patterns. The greater the volume
6.1 False Negative and Positive Alarms
of data available for sampling correlates to its ability to
distinguish between deviating behavior of benign
The first organizational objective for consideration is the
applications and the behavior of malicious applications.
accuracy of the NIDS in detecting attacks and the frequency
of its accuracy. The capability of the two types of NIDS;
heuristic and signature based are then analyzed to determine 6.2 Updates
their accuracy rate. In order to determine the accuracy of
these two systems, the false negatives and false positives of The organizational objective of updates is directly tied to
these systems are deduced. Pfleeger and Pfleeger identify a the organizational objective of false alarms. For signature
false positive as an alarm being raised for benign activity based NIDS, the inability of network personnel to provide
and depict a false negative as no alarms being raised for a timely updates of signatures, leaves an organization
real attack [10]. Delving into the premise on which vulnerable against attacks and increases the number of false
heuristic and signature based NIDS are structured through negatives as a result. Incompetent personnel can cause
analysis, it can be inferred which type of system would security vulnerabilities within an organization that utilizes a
create a particular type of false alarm. signature based NIDS, but this problem can be easily
False negatives are associated with signature based resolved through the hiring of a competent staff. The main
NIDS. Signature based NIDS require the use of signatures problem of concern is not the competency of security
incorporated into its database to match the signatures of personnel; rather, the dependency upon updates that creates
packets of data entering into the network. Signatures of vulnerabilities.
known viruses and other malicious codes are placed in the McHugh et al. indicates that the rapid change of product
database for signature matching. As a result, any attack for lists, surveys, and reviews cause software to become quickly
which it has the signature can be accurately identified and outdated [8]. Correspondingly, CERT (2006) has identified
detected. Unfortunately, newly created malicious code or over 5300 new software vulnerabilities for the first three
known viruses with modified signatures are allowed to go quarters of 2006 [14]. The direct correlation is evident as
undetected within the system and are classed as a false the necessity for frequent updates becomes mandatory,
negative. Such a drawback is owed to the inability of which is compounded further by the obsolescence of the
signature based NIDS to detect new attacks as stated by signatures within the database. As a result, the detective
McHugh et al. [8]. False positives are also generated by ability of a signature based NIDS is cast in doubt. The
signature based NIDS as supported by Conorich, who probability of identifying all new and existing
indicates that outdated malicious signatures could be the vulnerabilities and malicious codes is significantly low.
signatures of a new benign application programs [3] and a Furthermore, the constant deployment of new vulnerabilities
subsequently flagged due to these amendments. and threats compounds the problem. Consequently, security
Unlike signature based NIDS, the rate of false negatives personnel are unable to determine their level of
are rare for heuristic systems as supported by Liston [13]. preparedness against diverse threats.
The non-dependence upon signatures and the use of The dependency of signature based NIDS on updates is
statistical and behavioral patterns as the means to detect new at the root of the problem. A system that requires updates of
types of malicious code allows for a low false negative rate. newly created signatures in order to identify attacks is
Heuristic based NIDS use behavioral patterns of users, therefore limited by the signatures that it contains. This
applications and other program files to develop a pattern of inherent limitation allows the system to suffer from attacks
normal and abnormal behavior, which is then used to detect that have not been accounted for. Vulnerabilities are
established, not from signatures that are contained within

594
595
the database, rather, from signatures that are not updated to but is also capable of identifying new threats by utilizing
the database. As a result, it requires that personnel must be patterns of known behavior to depict a new attack.
able to identify vulnerabilities and threats before they are Therefore, it does not react to the development of a new
actually developed, which is unfathomable. The reactive attack; rather, it identifies the attack based on its deviation
nature of signature based NIDS supports such a premise. from known patterns. Therein lays the strength of heuristic
Signatures are only identified after conception, but attacks systems in its ability to identify old and new threats
against the network have already taken place before likewise, as asserted by McHugh et al. [8]. Eliminating the
signatures are developed to identify such attacks. dependency on updates creates a robust and secure system
Therefore, the system employs a reactive approach that allowing for an adaptive system against all threats.
minimizes its detection rate. Additionally, a high rate of
false positives is also associated with this type of NIDS. 6.3 Competency
Conorich indicates that updates are required to delete
outdated signatures that are being utilized by software The organizational objective of competency of network
developers as new application programs [3]. Therefore, personnel is directly tied to the issue of vulnerabilities being
monitoring of signatures that are being used for benign introduced through updates. A detection system that is
programs is also required in the update process in order to dependent directly upon the competency of personnel is an
lower the possibility of false positives. insecure system. NIDS are developed to be standalone
Heuristic based NIDS are not dependent on updates and devices whereby only monitoring and minimal maintenance
only require periodic adjustments to refine its behavioral by personnel is required. As discussed in the previous
analysis. The ability of heuristic systems to detect new and subsection, the dependency of signature based NIDS creates
existing abnormal or malicious activity provides network the necessity of intervention by personnel to update the
personnel with the assurance of its preparedness against signatures of the system, which brings the issue of
attacks. One of the drawbacks identified for heuristic competency into focus.
systems as indicated by the National Institute of Standards Signature based NIDS are entirely dependent upon the
and Technology (NIST), is their propensity for false competency of network personnel to detect attacks. Halme
positives because of their ability to detect new attacks [15]. & Bauer further illustrate the dependency of signature based
This drawback of false positives is actually an understated NIDS by indicating that their developers (and subsequently
advantage for heuristic systems in regards to updates and their system security officers) have to be knowledgeable
maintenance. about various software vulnerabilities [4]. It is therefore
As discussed prior, signature based systems are evident that an incompetent network security personnel
disadvantageous because of their established dependency on correlates to an ineffective signature based NIDS.
updates and their reactive nature, whereby vulnerabilities Technical detection controls whose performances are
are produced through signatures that were not captured. dependent on the human element are not beneficial to an
Conversely, a high number of false positives for heuristic organization. As McHugh et al. postulates, administrators
systems indicate their non-dependency on updates and are better served minimizing vulnerabilities through patches
allows for a proactive approach, which reduces the and other security measures than utilizing commercial IDSs,
possibility of creating vulnerabilities within the system. which attempt to detect known vulnerabilities [8].
The basis for such a premise is based on how false positives Vulnerabilities are introduced, not because of incompetent
are derived. As introduced prior, false positives occur for workers, but because of the requirement placed on workers
heuristic systems when benign programs, applications and to identify all known threats. Therefore, the security
users perform abnormal patterns deviating from past purpose of an organization is not realized if the signature
behavioral patterns. Although, false positive are a nuisance, based NIDS cannot be trusted. Ultimately, competence of
the human element is eliminated from the updating process personnel should not be the only factor in determining the
where most of the vulnerabilities are introduced. The effectiveness of a security device.
capability of the system to update its behavioral patterns and The issue of competency does not impact upon the
take a proactive approach, allows for a higher level of performance of a heuristic based NIDS. Conversely, its
security. As a result, threats are not detected based on ability to detect threats is dependent upon its ability to
information provided by personnel, but rather based on determine abnormal patterns within the network. Its
empirical behavioral patterns over a period of time. capability of learning, through statistical interpretation or
Therefore, heuristic systems are truly standalone devices modeling of behavioral patterns, whether accepted normal
and are able to avoid the introduction of vulnerabilities and abnormal behavior, allows for its performance to be
associated with updates. The problem of false alarms, while driven independent of network personnel. Pfleeger and
disconcerting to personnel, provides indefinite security Pfleeger posit that heuristic systems should be targeted to
coverage. False positives indicate a proactive approach to the information that they are to analyze. Apart from
the identification of threats. Being proactive implies that monitoring, providing the focus for a heuristic based NIDS
the system is capable not only of identifying known threats, is the only function provided by personnel. Consequently,

595
596
the competency of personnel is discounted when evaluating previous statistical or behavioral measurements to the
the system, which provides a secure environment in contrast measurements generated by the attack [16]. To evade a
with the environment offered by a signature based NIDS. heuristic system implies that the intruder is aware of the
Moreover, its detection rate is not inhibited by behavioral patterns of normal existing systems on the
incompetence. An independent system that requires network, in addition to determining what behavioral patterns
minimal intervention provides an adequate security would not be flagged by the heuristic system. As discussed
environment than a system that requires competent workers prior, a benign program may be flagged as threatening
in order to maintain its level of security. because it exceeds its expected behavioral scope. The
sensitivity of the system determines its capability of
6.4 Susceptibility to Attacks detecting evasive threats within the network. Additionally,
its propensity to detect false positives also provides the
The organizational objective of susceptibility to attacks ability to detect evasive threats. As discussed prior,
is very important to determine the level of security heuristic systems raise alarms for benign files and programs
provided. Understanding the types of attacks that may go that deviate from normal behavior. Conclusively, it is
unnoticed and measures that are available to resolve this evident that evasive threats will pass by undetected, but
problem is very critical to the level of security offered by through continuous sampling of behavioral patterns the rate
the two types of NIDS. Furthermore, the susceptibility to of detection is high. The basis for such a premise is that
attacks of the two types of NIDS correlates directly to over a period of time the threat will exhibit suspicious
vulnerabilities introduced due to updates and competent activity that is anomalous to normal behavior. For example,
workers. McHugh et al. stresses that the greatest threat to files that contain dormant viruses may go by undetected.
IDS is manifested through narrowly focused attacks Activation of the virus may cause the file to perform
launched by intruders who make serious attempts to avoid unusual requests that would be anomalous with its previous
detection by current and proposed IDS [8]. The behavioral pattern and allow for an alarm to be raised. The
organizational objective of susceptibility to attacks is issue of susceptibility is inherent with both systems, but
determinant on inherent flaws of the two types of NIDS. heuristic systems are capable of detecting such evasions,
Therefore, the organization is vulnerable unless when anomalous behavior is performed. Signature based
countermeasure can be employed to detect or minimize the NIDS are entirely dependent upon the ability of personnel to
frequency of undetected threats from evasive attacks. be aware that evasive action is being taken by attackers and
Deploying countermeasures for signature-based systems remains susceptible.
against evasive attacks proves to be very difficult.
Signature based systems utilize the technique of pattern 6.5 Coverage of NIDS
matching. If known signatures are modified in any way that
do not meet the pattern of the signatures contained within The coverage scope of the NIDS is pertinent to its ability
the database, no alarms are raised and the attack is to apply security to all facets of the network. Coverage of
undetected. Attackers utilize evasive attacks because they the network involves protecting against and monitoring for
prey upon the weaknesses of the matching system, which internal and external threats. For signature based NIDS, its
can only match in accordance with what is stored in the limitations is in its ability to cover attacks containing
database. The only countermeasure that counteracts the use signatures. Although it is able to identify attacks whose
of evasive signatures is the recognition by personnel that signatures are found within its database, other attacks are
attacks are evading the detection of the system and add the excluded from its coverage. Attacks that contain signatures
modified signature to the database. Consequently, this are typically external attacks, such as viruses and other
proves to be quite difficult because it infers that personnel malicious code. Internal users that attack the network do
are aware of the evasive techniques being used and are able not generate signatures that are detectable. For instance,
to determine how the signature of the attack was modified. employees that go beyond their authorized range to record
Moreover, this countermeasure is entirely dependent upon sensitive information or personnel that develop holes and
the security personnel and the system is unable to develop backdoors within the security system are undetectable by a
countermeasures otherwise. Therefore, the susceptibility to signature-based system. These types of intrusions may
attacks that exist within the structure of a signature based cause havoc to the organization, but do not develop
NIDS, continues to inhibit its detection rate because of the signatures to indicate the intrusion to the NIDS.
inability of personnel to identify all possible new or Consequently, this one-sided approach provides a defense
modified signatures. against external threats, but leaves the network vulnerable to
Heuristic based systems also allow undetected threats internal threats.
into the network system, but its rate of detection to evasive Heuristic based NIDS, in contrast, are able to cover all
techniques are significantly higher in comparison to aspects of the network, both external and internal threats.
signature based systems. As indicated by Taylor and Foss- External and internal threats are detected based on their
Alves, heuristic based systems are capable of comparing abnormal behavior patterns. Halme and Bauer describe the

596
597
ability of heuristic NIDS to detect malicious user activity by system [10]. Accordingly, the system must be able to cope
developing a user profile by which the user is expected to in a network environment where activities are diverse and
adhere to in future activities [4]. Any deviation from this not systematic.
profile would raise an alarm upon detection. The capability
of heuristic systems to model all types of activities from 7. CONCLUSIONS AND ANALYSIS
programs, applications and users allow for a full coverage of
protection. Any deviation from normal behavior will be Upon review of the main comparative objectives
detected and raises an alarm. Even impersonation of users discussed, a summary and conclusive analysis is discussed
can be detected if the activities of the impersonator deviate to determine the most effective system for an organization.
from an authorized user. Identifying attacks based on In accordance with the purpose of the paper, the
statistical and behavioral patterns allow for any entity on the organizational objectives as defined in the paper should be
system to be modeled and analyzed. Therefore, coverage is met sufficiently by the NIDS to be implemented. In
provided for components within the range of the network on summary, the first objective of false negatives and positives
which the NIDS is deployed. The ability to detect user plague both NIDS. From a security standpoint, false
activity makes the system more beneficial, since both positives are tolerable, while false negatives are intolerable
external and internal threats are accounted. because they allow attacks to go by undetected. The
objectives of updates, competency and susceptibility to
6.6 Limitations of NIDS attacks are all directly tied together. For signature based
NIDS these objectives are related to its dependency on
The final organizational objective provides a discussion competent personnel for updates, which as a result leaves it
on the limitations that exist within the two systems. As susceptible to attacks. In contrast, heuristic based NIDS
developed through previous sections, the limitations of utilize behavioral patterns and do not require updates and
signature based NIDS are very clear; the attack is known competent personnel. Additionally, its susceptibility to
and is detected or the attack is unknown to the system and attacks is reduced based on its ability to refine its detection
allows the attack to proceed undetected. Snort, a leading analysis through continual sampling of normal behavior.
commercial open source NIDS utilizing a signature based The objective of coverage indicates that heuristic based
approach, provides a definition of the capability of their system covers all aspects of the network, both internally and
system in its ability to perform analysis based against user- externally. Signature based systems only cover attacks with
defined rules and matches these rules accordingly [13]. signatures, which are typically external attacks and leaves
Through this definition of the typical signature based NIDS, the organization vulnerable to internal threats. Finally, the
two inherent limitations can be developed. The first inherent limitations indicate that unknown attacks plague
limitation is the dependency on network personnel to continually, signature based NIDS. In contrast, heuristic
provide the user defined rules to detect malicious code. based NIDS are limited by the necessity for attacks to
This limitation leads directly to the second limitation exhibit abnormal behavioral patterns. Threats that do not
whereby signatures that are not placed in its database go exhibit abnormal behavior are undetectable to the system.
undetected. In conclusion, it is evident the thesis is proven as
Heuristic based NIDS do not suffer the same inherent heuristic based NIDS effectively meet the organizational
limitations as signature based NIDS, but they do have objectives of an organization in contrast to a signature based
limitations. One limitation is inherent to its structure, which NIDS. The basis for such analysis is determined by the
is the need for abnormality by malicious internal or external contrasting composition of the two NIDSs. The dependency
activities. McHugh provides support by stating that upon competent personnel by a signature based NIDS is the
assumptions are made that intrusions would provide unusual underlying factor of its inadequacy. Succinctly, a detection
activity that would allow for detection [2]. This assumption system is not feasible if its performance is based solely on
creates a limitation if the behavioral patterns of intrusions personnel. Additionally, vulnerabilities are introduced
are similar to those of normal programs. Another limitation regardless to the competence level of the personnel.
inherent to its structure is the changes to behavioral patterns Therefore, a system that is inherently vulnerable to attack is
that are not malicious. Abnormal benign activity that a system that must be overlooked by an organization
deviates from normal patterns creates several problems for seeking an adequate security defense. In contrast, the
heuristic based systems. It creates a high number of false common underlying factor for a heuristic based NIDS
positives and requires profile updates to accommodate these indicates its adaptability and flexibility in detecting known,
changes in patterns. McHugh et al. categorizes this unknown or evasive threats in the network. Its ability to
limitation as a drawback due to the need for retraining of the learn from continual sampling of statistical and behavioral
system to account for natural changes [8]. Pfleeger and patterns allows the system to determine threats, whether
Pfleeger further strengthen the contention by indicating that new or existing. Therefore, an organization should utilize
heuristic based systems are limited by the information this type of system for its security defense because it
analyzed and how well the analysis fits into its current provides a system that is independent of updates and

597
598
personnel and the inherent ability to detect most attacks in Software 17(5), 42-51. Retrieved October 2, 2006, from
the network, whether internally and externally or new and IEEE Computer Society Digital Library database.
modified.
[9] Messmer, Ellen. (2006, October 9). Software
8. Future Work vulnerabilities already outnumber last year’s crop.
Computerworld. Retrieved October 22, 2006 from
Future work would be to investigate theoretically whether http://www.computerworld.com/action/article.do?command
intrusion prevention systems are as advantageous and =viewArticleBasic&taxonomyName=cybercrime_hacking&
beneficial as claimed by most in comparison to IDS. articleId=9004000&taxonomyId=82
Additionally, the benefits of managed security service
providers would be investigated in order to determine if it is [10] Pfleeger, C. F., & Pfleeger, S. L. (2003). Security in
more feasible for outsourcing some of the security duties on computing (3rd ed.). Upper Saddle River, NJ: Pearson
these providers rather than having everything conducted in- Education.
house.
[11] Snort: Getting started. (n.d.). Retrieved October 21,
References 2006, from
http://www.snort.org/docs/snort_htmanuals/htmanual_260/n
[1] Chuvakin, A. (2004). Monitoring IDS. Information ode3.html
Systems Security 12(6), 12-16. Retrieved October 2, 2006,
from Business Source Premiere database. [12] Jaques, R. (2005, February 1). Cost of malware soars to
$166bn in 2004. Retrieved October 27, 2006, from
[2] McHugh, J. (2001). Intrusion and intrusion detection. http://www.vnunet.com/vnunet/news/2126635/cost-
International Journal of Information Security 1(1), 14-36. malware-soars-166bn-2004
Retrieved October 2, 2006, from Business Source Premiere
database. [13] Liston, K. (n.d.). Intrusion detection FAQ: Can you
explain traffic analysis and anomaly detection. Retrieved
[3] Conorich, D. G. (2004). Monitoring intrusion detection October 30, 2006, from
systems: From data to knowledge. Information Systems http://www.sans.org/resources/idfaq/anomaly_detection.php
Security 13(2), 19-30. Retrieved October 02, 2006, from ?portal=ecf89f730aa7b32ca4ffd0a7117c132f
WilsonSelect Plus database.
[14] CERT Coordination Center (2006, October 23).
[4] Halme, L. R., & Bauer, R. K. (n.d.) Intrusion detection CERT/CC statistics 1988-2006. Retrieved October 30,
FAQ: AINT misbehaving: A taxonomy of anti-intrusion 2006, from http://www.cert.org/stats/cert_stats.html
techniques. Retrieved October 31, 2006, from
http://www.sans.org/resources/idfaq/aint.php?portal=ab97d [15] NIST (n.d.) An overview of issues in testing intrusion
321c015e6845470acba5bea5b29 detection systems. Retrieved October 31, 2006, from
http://csrc.nist.gov/publications/nistir/nistir-7007.pdf
[5] Iheagwara, C. (2004). The effect of intrusion detection
management methods on the return on investment. [16] Taylor, C., & Foss-Alves, J. (2001). NATE: Network
Computers and Security, 23(3), 213-228. Retrieved October analysis of anomalous traffic events, a low cost approach.
23, 2006, from ScienceDirect database. Proceedings of the 2001 workshop on New security
paradigms, USA, 89-96. Retrieved November 10, 2006,
[6] CERT Coordination Center (n.d.). Management and from ACM Digital Library database.
education of the risk of insider threat (MERIT): System
dynamics modeling of computer system sabotage. Retrieved [17] Schwartz, K. D. (2005). Network anomalies.
November 15, 2006, from Government Executive, 37(12), 81-82. Retrieved November
http://www.cert.org/archive/pdf/merit.pdf 13, 2006, from Business Source Premiere database.

[7] Lemke, T. (2004, March 17). Virus creators share code [18] Lynch, D. M. (2006). Securing against insider attacks.
online to create copycats. Washington Times. Retrieved Information Security Systems, 15(5), 39-47. Retrieved
October 22, 2006, from http://washingtontimes.com November 15, 2006, from Academic Search Premier
database.
[8] McHugh, J., Christie, A., & Allen, J. (2000). Defending
yourself: The role of intrusion detection systems. IEEE

598
599

You might also like